WO2000036542A2 - Enterprise computer system - Google Patents

Enterprise computer system Download PDF

Info

Publication number
WO2000036542A2
WO2000036542A2 PCT/US1999/030216 US9930216W WO0036542A2 WO 2000036542 A2 WO2000036542 A2 WO 2000036542A2 US 9930216 W US9930216 W US 9930216W WO 0036542 A2 WO0036542 A2 WO 0036542A2
Authority
WO
WIPO (PCT)
Prior art keywords
event
computer system
recited
information
broker
Prior art date
Application number
PCT/US1999/030216
Other languages
French (fr)
Other versions
WO2000036542A9 (en
WO2000036542A3 (en
Inventor
Rafael Bracho
Steven M. Jankowski
Original Assignee
Active Software, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Active Software, Inc. filed Critical Active Software, Inc.
Priority to AU23694/00A priority Critical patent/AU2369400A/en
Publication of WO2000036542A2 publication Critical patent/WO2000036542A2/en
Publication of WO2000036542A3 publication Critical patent/WO2000036542A3/en
Publication of WO2000036542A9 publication Critical patent/WO2000036542A9/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/542Event management; Broadcasting; Multicasting; Notifications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/54Indexing scheme relating to G06F9/54
    • G06F2209/544Remote
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/54Indexing scheme relating to G06F9/54
    • G06F2209/547Messaging middleware
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99944Object-oriented database structure
    • Y10S707/99945Object-oriented database structure processing

Definitions

  • the present invention relates generally to the field of digital data processing systems, and more particularly to integrating the flow of information between a variety of computing tools in an enterprise computing environment.
  • modem enterprise computing environments that is, computer systems for use in an office environment in a company, for example, a number of personal computers, workstations, mainframes, and the like along with other devices such as large mass storage subsystems, network interfaces, as well as interfaces to the public telephony systems may be interconnected to provide an integrated environment in which information may be shared among various users.
  • users may be performing a variety of operations, including order receipt, manufacturing, shipping, billing, inventory control, and other operations in which sharing of data on a real time basis may provide a significant advantage over, for example, maintaining separate records and attempting to reconcile them later.
  • Another strategy is to provide an information exchange engine that can translate data between model's formats of various programs which may be used in the ente ⁇ rise computing environment. While this will allow each program to have its own data or programming model, it may require acquiring and maintaining exchange engines for a number of programs and a user to select an appropriate exchange engine when importing or exporting information form another program.
  • the interconnections between each of the components becomes prohibitively complex forming a "spaghetti like mass". This increase in complexity effectively limits the scalability of an integrated set of computer resources since any additional computer resources requires reconfiguring the entire system.
  • FIG 1 is an illustration of a conventional ente ⁇ rise computing system 100.
  • the ente ⁇ rise computing system 100 includes exchange engines 102-110 capable of accessing and cross connection of any number and type of information platforms 112 and 114.
  • Such platforms include various database management systems, applications programs, large mass storage subsystems, network interfaces, as well as interfaces to the public telephony systems such as to the Internet.
  • the database management applications generally include computer programs that are executed in conventional manner by digital computer systems.
  • the exchange engines include computer programs executed by digital computer systems (which may be the same digital computer systems on which their respective applications programs are executed).
  • the exchange engines and the application programs are processed and maintained on a number of digital computer systems interconnected by, for example, a network 116 which transfers data access requests, translated data access requests and responses between the computer systems on which the exchange engines and application programs are processed.
  • a network 116 which transfers data access requests, translated data access requests and responses between the computer systems on which the exchange engines and application programs are processed.
  • Transaction security is also of paramount importance since users must be certain that all transactions carried out over the ente ⁇ rise computer system are secure.
  • secure it is meant that sensitive information, such as account numbers, account balances, passwords, etc. are safe from unauthorized users.
  • ente ⁇ rise computer systems have used various encryption type solutions to these problems.
  • encryption type security measures can be useful in protecting information itself, providing transactional security is more problematic.
  • transactional security it is meant that a subscriber, for example, is only able to receive events (authorized) of a specific security level, such as secret, or lower such as confidential. However, this same subscriber will not be authorized to receive higher level security, such as top secret.
  • a scalable ente ⁇ rise computer system having the capability to provide transaction security.
  • the scalable ente ⁇ rise computer system should also be capable of providing subscription filtering.
  • a scalable ente ⁇ rise computer system having the capability to provide transaction security as well as providing subscription filtering is disclosed.
  • a connection between an information broker and an event publisher is established, the event to be published is then determined to be registered with the information broker.
  • the registered event is indentified as being subscribed to by the subscriber, then the registered event is populated with event content. The populated event is then published to and received by the information broker.
  • an ente ⁇ rise computer system in another embodiment, includes a publisher capable of publishing an event and an information broker validly coupled to the publisher arranged to receive the published event.
  • the ente ⁇ rise computer system further includes a content filter coupled to the information broker and a subscriber arranged to receive a properly subscribed to published event.
  • the information broker determines whether or not the received event is the properly subscribed to event by determining if an event type corresponding to the published event matches a subscription associated with the subscriber, whether or not an event security level corresponding to the event is verified, determining whether or not an event content matches the content filter, and whether or not an event authorization is valid. In those cases where the published event's type matches the subscription and when the event security level is verified, and when the event content matches the content filter, and when the event authorization is valid, then the event is the properly subscribed to event as determined by the information broker.
  • Figure 1 is an illustration of a conventional ente ⁇ rise computing system
  • FIG. 2 is a block diagram of a general pu ⁇ ose computer system suitable for carrying out the processing according to the present invention
  • Figure 3 is an ente ⁇ rise computer system in accordance with an embodiment of the invention
  • FIG. 4 A shows how a relational data base (RDB) adapter translates an event to SQL in accordance with an embodiment of the invention
  • Figure 4B shows a C++ application adapter mapping an event to data structures in a memory in accordance with an embodiment of the invention
  • FIG. 5 A shows an event in accordance with an embodiment of the invention
  • Figure 5B shows an exemplary inventory control event in accordance with an embodiment of the invention.
  • Figure 6A is a flowchart detailing a process 600 of establishing a subscription to an event in accordance with an embodiment of the invention
  • Figure 6B is a flowchart detailing a process for publishing a subscripted to event in accordance with an embodiment of the invention
  • Figure 7 is a flowchart detailing a process of whereby an information broker delivers an event to a subscriber in accordance with an embodiment of the invention
  • FIG. 8 is a flowchart detailing the process of request/reply in accordance with an embodiment of the invention.
  • Figure 9 is an ente ⁇ rise computer system in accordance with an embodiment of the invention.
  • Figure 10 is an ente ⁇ rise computer system having multiple subscribers in accordance with an embodiment of the invention;
  • Figure 11 shows an information broker queue sharing in accordance with an embodiment of the invention
  • Figure 12 in accordance with an embodiment of the invention, is an ente ⁇ rise computer system having multiple cooperating information brokers
  • Figure 13 is a flowchart detailing a process of verifying client membership in accordance with an embodiment of the invention.
  • Figure 14 in accordance with an embodiment of the invention, is an ente ⁇ rise computer system having an authentication server; and Figure 15 is a flowchart detailing a process of authenticating an event based upon a subscriber authorization mask in accordance with an embodiment of the invention.
  • the present invention employs various computer-implemented operations involving data stored in computer systems. These operations include, but are not limited to, those requiring physical manipulation of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated.
  • the operations described herein that form part of the invention are useful machine operations.
  • the manipulations performed are often referred to in terms, such as, producing, identifying, running, determining, comparing, executing, downloading, or detecting. It is sometimes convenient, principally for reasons of common usage, to refer to these electrical or magnetic signals as bits, values, elements, variables, characters, data, or the like. It should remembered however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities.
  • the present invention also relates to a device, system or apparatus for performing the aforementioned operations.
  • the system may be specially constructed for the required pu ⁇ oses, or it may be a general pu ⁇ ose computer selectively activated or configured by a computer program stored in the computer.
  • the processes presented above are not inherently related to any particular computer or other computing apparatus.
  • various general pu ⁇ ose computers may be used with programs written in accordance with the teachings herein, or, alternatively, it may be more convenient to construct a more specialized computer system to perform the required operations.
  • FIG. 2 is a block diagram of a general pu ⁇ ose computer system 200 suitable for carrying out the processing according to the present invention.
  • Computer system 200 made up of various subsystems described below, includes at least one microprocessor subsystem (also referred to as a central processing unit, or (CPU) 202). That is, CPU 202 can be implemented by a single-chip processor or by multiple processors.
  • CPU 202 is a general pu ⁇ ose digital processor which controls the operation of the computer system 200. Using instructions retrieved from memory, the CPU 202 controls the reception and manipulation of input data, and the output and display of data on output devices.
  • CPU 202 is coupled bi-directionally with a primary storage device 204, typically random access memory (RAM), and uni-directionally with a primary storage device 206, typically a read-only memory (ROM), via a memory bus 208.
  • primary storage device 204 can be used as a general storage area and as scratch-pad memory, and can also be used to store input data and processed data.
  • the primary storage device 204 can also store programming instructions and data, in the form of data objects or constructs representing units of information in addition to other data and instructions for processes operating on CPU 202.
  • the primary storage device 204 can also be used for fast transfer of data and instructions in a bi-directional manner over the memory bus 208.
  • primary storage device 206 typically includes basic operating instructions, program code, data and objects used by the CPU 202 to perform its functions.
  • Primary storage devices 204 and 206 may include any suitable computer-readable storage media, described below, depending on whether, for example, data access needs to be bi-directional or uni-directional.
  • CPU 202 can also directly and very rapidly retrieve and store frequently needed data in a cache memory 120.
  • a removable mass storage device 222 provides additional data storage capacity or the computer system 200, and is coupled either bi-directionally or uni-directionally to CPU 202 via a peripheral bus 224.
  • a specific removable mass storage device commonly known as a CD-ROM typically passes data uni-directionally to the CPU 202, whereas a floppy disk can pass data bi-directionally to the CPU 202.
  • Storage device 222 may also include computer-readable media such as magnetic tape, Rash memory, signals embodied on a carrier wave, PC-CARDS, portable mass storage devices, holographic storage devices, and other storage devices.
  • a fixed mass storage device 216 also provides additional data storage capacity and is coupled bi-directionally to CPU 202 via peripheral bus 224.
  • mass storage device 216 is a hard disk drive. Generally, access to these media is slower than access to primary storage device 204 and 206. Mass storage device 222 and 216 generally store additional programming instructions, data, and the like that typically are not in active use by the CPU 202. It will be appreciated that the information retained within mass storage device 222 and 216 may be inco ⁇ orated, if needed, in standard fashion as part of primary storage device 204 (e.g. RAM) as virtual memory.
  • the peripheral bus 224 is used to provide access other subsystems and devices as well. In the described embodiment, these include a display monitor 218 and adapter 220, a printer device 222, a network interface 224, an auxiliary input/output device interface 226, a sound card 228 and speakers 230, and other subsystems as needed.
  • the network interface 224 allows CPU 202 to be coupled to another computer, computer network, or telecommunications network using a network connection as shown. Through the network interface 224, it is contemplated that the CPU 202 might receive information e.g., data objects or program instructions, from another network, or might output information to another network in the course of performing the above described method steps. Information, often represented as a sequence of instructions to be executed on a CPU, may be received from and outputted to another network, for example, in the form of a computer data signal embodied in a carrier wave. An interface card or similar device and appropriate software implemented by CPU 202 can be used to connect the computer system 200 to an external network and transfer data according to standard protocols.
  • method embodiments of the present invention may execute solely upon CPU 202, or may be performed across a network such as the Internet, intranet networks, or local area networks, in conjunction with a remote CPU that shares a portion of the processing.
  • Additional mass storage devices may also be connected to CPU 202 through network interface 224.
  • Auxiliary I/O device interface 226 represents general and customized interfaces that allow the CPU 202 to send and, more typically, receive data from other devices such as microphones, touch-sensitive displays, transducer card readers, tape readers, operation of the computer system 200. Using instructions retrieved from memory, the CPU 202 controls the reception and manipulation of input data, and the output and display of data on output devices.
  • CPU 202 is coupled bi-directionally with a first primary storage device 204, typically random access memory (RAM), and uni-directionally with a second primary storage area 206, typically a read-only memory (ROM), via a memory bus 208.
  • RAM random access memory
  • ROM read-only memory
  • primary storage device 204 can be used as a general storage area and as scratch-pad memory, and can also be used to store input data and processed data. It can also store programming instructions and data, in the form of data objects or constructs representing units of information in addition to other data and instructions for processes operating on CPU 202, and is used typically used for fast transfer of data and instructions in a hi-directional manner over the memory bus 208. Also as well known in the art, primary storage device 206 typically includes basic operating instructions, program code, data and objects used by the CPU 202 to perform its functions. Primary storage devices 204 and 206 may include any suitable computer readable storage media, described below, depending on whether, for example, data access needs to be bi-directional or uni-directional.
  • CPU 202 can also directly and very rapidly retrieve and store frequently needed data in a cache memory 220.
  • a removable mass storage device 222 provides additional data storage capacity or the computer system 200, and is coupled either bi-directionally or uni-directionally to CPU 202 via a peripheral bus 224.
  • a specific removable mass storage device commonly known as CD-ROM typically passes data uni-directionally to the CPU 202, whereas a floppy disk can pass data bi-directionally to the CPU 202.
  • Storage device 222 may also include computer-readable media such as magnetic tape, flash memory, signals embodied on a carrier wave, PC-CARDS, portable mass storage devices, holographic storage devices, and other storage devices.
  • a fixed mass storage 116 also provides additional data storage capacity and is coupled bi-directionally to CPU 202 via peripheral bus 224.
  • the most common example of mass storage device 216 is a hard disk drive. Generally, access to these media is slower than access to primary storage device 204 and 206.
  • Mass storage device 222 and 216 generally store additional programming instructions, data, and the like that typically are not in active use by the CPU 202. It will be appreciated that the information retained within mass storage device 222 and 216 may be inco ⁇ orated, if needed, in standard fashion as part of primary storage device 204 (e.g. RAM) as virtual memory.
  • peripheral bus 224 is used to provide access to other subsystems and devices as well.
  • these include a display monitor 218 and adapter 220, a printer device 222, a network interface 224, an auxiliary input/output device interface 226, a sound card 228 and speakers 230, and other subsystems as needed.
  • the network interface 224 allows CPU 202 to be coupled to another computer, computer network, or telecommunications network using a network connection as shown. Through the network interface 224, it is contemplated that the CPU 202 might receive information, e.g., data objects or program instructions, from another network, or might output information to another network in the course of performing the above described method steps. Information, often represented as a sequence of instructions to be executed on a CPU, may be received from and output to another network, for example, in the form of a computer data signal embodied in a carrier wave.
  • An interface card or similar device and appropriate software implemented by CPU 202 can be used to connect the computer system 200 to an external network and transfer data according to standard protocols, that is, method embodiments of the present invention may execute solely upon CPU 202, or may be performed across a network such as the internet, intranet networks, or local area networks, in conjunction with a remote CPU that shares a portion of the processing. Additional mass storage devices (not shown) may also be connected to CPU 202 through network interface 224.
  • embodiments of the present invention further relate to computer storage products with a computer readable medium that contain program code for performing various computer implemented operations.
  • the computer readable medium is any data storage device that can store data which can thereafter be read by a computer system, the media and program code may be those specially designed and constructed for the pu ⁇ oses of the present invention, or they may be of the kind well known to those of ordinary skill in the computer software arts.
  • Examples of computer readable media include, but are not limited to, all the media mentioned above: magnetic media such as hard disks, floppy disks, and magnetic tape; optical media such as CD-ROM disks; magneto-optical media such as floptical disks; and specially configured hardware devices such as application-specific integrated circuits (ASICs), programmable logic devices (PLDs), and ROM and RAM devices.
  • magnetic media such as hard disks, floppy disks, and magnetic tape
  • optical media such as CD-ROM disks
  • magneto-optical media such as floptical disks
  • specially configured hardware devices such as application-specific integrated circuits (ASICs), programmable logic devices (PLDs), and ROM and RAM devices.
  • the computer-readable medium can also be distributed as a data signal embodied in a carrier wave over a network of coupled computer systems so that the computer-readable code is stored and executed in a distributed fashion.
  • Examples of program code include both machine code, as produced, for example, by a compiler, or files containing higher level code that may be executed using an inte ⁇ reter.
  • the media and program code may be those specially designed and constructed for the pu ⁇ oses of the present invention, or they may be of the kind well known to those of ordinary skill in the computer software arts.
  • Examples of computer-readable media include, but are not limited to, all the media mentioned above: magnetic media such as hard disks, floppy disks, and magnetic tape; optical media such as CD-ROM disks; magneto-optical media such as floptical, disks; and specially configured hardware devices such as application-specific integrated circuits (ASICs), programmable logic devices (PLDs), and ROM and RAM devices.
  • the computer-readable medium can also be distributed as a data signal embodied in a carrier wave over a network of coupled computer systems so that the computer readable code is stored and executed in a distributed fashion.
  • Examples of program code include both machine code, as produced, for example, by a compiler, or files containing higher level code that may be executed using an inte ⁇ reter. It will be appreciated by those skilled in the art that the above described hardware and software elements are of standard design and construction.
  • Other computer systems suitable for use with the invention may include additional or fewer subsystems.
  • memory bus 208, peripheral bus 224, and local bus 234 are illustrative of any interconnection scheme serving to link the subsystems.
  • a local bus could be used to connect the CPU to fixed mass storage device 216 and display adapter 220.
  • the computer system shown in Figure 2 is but an example of a computer system suitable for use with the invention. Other computer architectures having different configurations of subsystems may also be utilized.
  • the ente ⁇ rise computer system 300 includes any number of information resources organized around an information broker 302.
  • Information resources are producers and/or consumers of co ⁇ orate information, for example, and can include networks, such as Local Area Network (LAN) 304 that in turn includes any number of individual computer systems 306a and 306b, for example.
  • LAN Local Area Network
  • Such computer systems can take the form of computer system 200 shown in Figure 2 and as such can include mass storage devices, network interfaces, etc.
  • information resources can include conventional to databases represented by mass storage unit 310, applications resident on computers 312 and 314, as well as the internet, the mass storage device 310 typically stores information in the form of useful documents.
  • each of the individual computer systems included in the ente ⁇ rise computer system 300 is coupled to an associated storage device 308.
  • the computer systems 306a and 306b of the LAN 304 each have an associated storage device 308a and 308b, respectively.
  • One or more of these storage devices can be utilized to store various data objects or documents which may be periodically accessed and processed by a user within the ente ⁇ rise computer system 300.
  • the ente ⁇ rise computer system 300 also includes a mainframe computer 316.
  • the mainframe computer 316 may also be connected to a storage device 318 capable of acting as a remote storage device for the LAN 304, for example.
  • the components of the ente ⁇ rise computer system 300 may be located a great geographical distance from each other.
  • the mainframe 316 may be located in, for example, San Francisco, while the LAN 304 may be located in Los Angeles.
  • the ente ⁇ rise computer system 300 also includes adapters 320 through 330 arranged to connect associated information resource to the information broker 302.
  • the adapter 320 connects LAN 304 to the information broker 302 while the adapter 328 connects the mass storage device 310 to the information broke 302.
  • the combination of an information resource and its associated adapter is referred to as a broker client.
  • the mainframe 316 and its associated adapter 322 form a broker client 332.
  • adapters integrate diverse information resources by enabling them to exchange a common unit of information referred to hereinafter as the event.
  • Events are messages exchanged by broker clients. To send an event, a broker client publishes it, conversely, to receive events of a particular type, a broker client subscribes to that event type. Each event is typed to distinguish it from other events, and self-describing, so it can be filtered by its contents. Events constitute both a common currency for information exchange and a common language suitable for describing and discussing disparate co ⁇ orate information.
  • Agents are software components that embody business processes by subscribing to particular types of events, applying business rules to those events, and as a result, publishing other types of events. As shown in Figure 3, agents 334 and 336 are coupled to the information broker 302 providing thereby the capability of applying any desired business rule to any event received by the information broker 302.
  • heterogeneous computing platforms can include, for example application programs suitable for processing critical business transactions such as order entry, shipping, billing, receivables, and so on resident on computer 312 or 314. Since many of these applications come in "package" form (i.e., bought as turn key application with little or no user knowledge of the software itself besides being able to use it) many users are either reluctant or incapable of modifying the application software to make it compatible with other computing platforms.
  • each programming model typically includes programming code based upon different models.
  • any of the heterogeneous computing platforms resident in the ente ⁇ rise computer system 300 are capable of communication.
  • a relational database (RDB) adapter 402 translates an event 404 to SQL
  • a C++ application adapter 412 maps an event 414 to data structures in a memory 416.
  • An event is typically a business event that is discovered or created by one resource and is of interest to other resources.
  • a co ⁇ oration can define events for their particular needs and practices related to marketing, billing, orders and shipments, manufacturing, employment, etc.
  • Each event contains information particular to it, such as for example, Employee-Number or Invoice- Amount.
  • each event contains sufficient information to completely characterize and analyze it without resorting to other resources, such as databases, which are subject to change.
  • Figure 5 A illustrates an event 500 in accordance with an embodiment of the invention.
  • the event 500 includes an event type data field 502, an associated event data field 504, and an event envelop 506.
  • the event envelop 506 is populated by the system with system parameters, such as for example, transaction security fields, return addresses, etc.
  • system parameters such as for example, transaction security fields, return addresses, etc.
  • an event 508 associated with a manufacturing company is shown in Figure 5B.
  • the event 508 then contains an event type data field 510 indicating for example, the event 508 pertains to inventory control.
  • the associated event data field 512 would contain data fields specific to a particular inventory control transaction.
  • Such transaction specific data fields would include, for example, a transaction type field 514, an Invoicenumber field 516, an Amount field 518, and a Transaction Date field 520.
  • Other data fields can be included in the event data structure 500 at the discretion of the information resource producing the event 500.
  • the associated event envelop 522 would then be populated by the system to include transaction security, return addresses, as well as control and publisher labels described below.
  • Event producing resources publish events while event consuming resources subscribe to event types and receive events of those types. Some resources publish one set of events and subscribe to other types of events. Because event delivery is brokered, an unavailable subscriber never delays a publisher, and a subscriber only receives events when it is ready. The tasks of event queuing, routing, and delivery are the responsibilities of the information broker described shortly.
  • Figure 6A is a flowchart detailing a process 600 of establishing a subscription to an event in accordance with an embodiment of the invention.
  • a connection with an information broker 602 must be established. It is then determined if the event is registered with the information broker 604. If it is determined that the event is not registered with the information broker, then the subscription is rejected 606. If, however, it is determined that the event is registered with the information broker, then an output queue is created 608 and the subscription is accepted 610.
  • Figure 6B is a flowchart detailing a process 612 for publishing a subscripted to event in accordance with an embodiment of the invention.
  • FIG. 7 is a flowchart detailing a process 700 whereby an information broker delivers an event to a subscriber in accordance with an embodiment of the invention.
  • a broker client referred to as a subscriber
  • Subscriptions can be registered manually by using administrative tools or automatically by adapters.
  • a single session subscription remains effective unit the subscriber breaks the network connection with its broker.
  • a multi session subscription persists until it is cancelled.
  • the information broker delivers the events it has queued.
  • an information broker When an information broker receives a published event, it examines its subscription for the event type 702 and then determines if the event type matches the subscription 704. For each matching subscription, the information broker delivers, queues, or ignores the event, depending on whether the subscription is single session or multi session and whether the subscriber is running or not. The information broker determines if the event security level is verified 705 then determines if the event content matches a content filter 706. For each matching subscription, the information broker then determines if the event's authorization is valid 708. For all authorized events, the information broker then determines whether the matching subscription is a single session subscription or a multi-session subscription 710. If it is determined to be a multi-session subscription, the information broker then determines if the multi-session subscription is cancelled 712.
  • the information broker ignores the event and stops processing. If, however, the multi-session subscription is not cancelled, the information broker determines if the connection is valid 714. If the connection is valid, the information broker queues the event to the subscriber 720.
  • information brokers In addition to shielding publishers and subscribers from event delivery problems, including intermittent network failures, information brokers have important administrative functions They maintain registries of events that developers can browse. They provide data on publish and receive rates of resources, lengths of queues, and so on, exposing network problems and possibly indicating that a hardware upgrade may soon be in order. It should be noted that adding and deleting subscribers has no effect on publishers; neither does adding or deleting publishers affect subscribers. Publishers and subscribers can be altered, or even replaced, so long as the contract specified in their mutual event definitions is observed. Although the publish/subscribe model fits many resource communication needs, it does not fit all of them.
  • FIG. 8 is a flowchart detailing the process 800 of request/reply in accordance with an embodiment of the invention.
  • a broker client that provides a service subscribes to an event type that represents a request for that service 802.
  • a broker client publishes a request event containing a "return address" 804.
  • the return address consists of the requestor's ID, possibly generated by the information broker, and a tag that distinguishes the event from others the requestor has published.
  • the service provider receives the request event 806, performs the service 808, and copies the results and the return address into the reply event 810. Then, instead of publishing the reply, the service provider directs the broker to deliver it 812.
  • the broker can queue or deliver it instantly, bypassing subscription matching and filtering.
  • the recipient does not need a subscription to the reply event type, but must be a member of what is referred to as a client group that has permission to receive it; the service provider must be a member of a client group (i.e., associated group of clients) that has permission to send the reply type.
  • each client group lists the types of events that members of the group are authorized to send (publish or deliver) and the types of events they are authorized to receive (by subscription or reply).
  • Information Brokers One aspect of information brokers is that they guarantee that, with respect to a particular subscriber, events are delivered exactly once and same-priority events from one publisher are delivered in the order they were published. The first part of this guarantee frees subscribers from having to detect duplicate events, which they must do in ente ⁇ rise computer systems that deliver messages at least once. The second part enables publishers and subscribers to rely on event temporal effects. For example, suppose that a publisher publishes event A and then event B, and that a subscriber responds to event A by creating something that's needed for responding to event B-a database record, for example. If a network problem delays event A so that B arrives first, the subscriber would perform erroneously unless it is encumbered with logic for handling out-of-order arrivals.
  • the event delivery guarantee is an example of concentrating complexity in information brokers to simplify associated broker clients.
  • Figure 9 is an ente ⁇ rise computer system 900 in accordance with an embodiment of the invention. It should be noted that ente ⁇ rise computer system 900 is one embodiment of the ente ⁇ rise computer system 300 shown in Figure 3. It should also be noted, that the connotation of publisher and subscriber is for sake of clarity only and it should be borne in mind that any broker-client can be a publisher or a subscriber as deemed appropriate.
  • the ente ⁇ rise computer system 900 includes a publisher 902, a subscriber 904, and an information broker 906.
  • the publisher 902 includes a publisher information resource 902a connected to a publisher adapter 902b while the subscriber 904 includes a subscriber information resource 904a connected an associated subscriber adapter 904b.
  • the information broker includes a pre-processor 912 connected to a pre-processing queue 914 arranged to store any event preprocessed and sent by the pre-processor 912.
  • the pre-processor 912 populates the event envelop that includes, for example, return address, content and publisher labels.
  • the preprocessor 912 uses the various data fields included in the event envelop to appropriately process the event.
  • the pre-processing queue 914 is, in turn, connected to an event filter 916.
  • the event filter 916 is used by the information broker 906 to filter those events received from the pre-processing queue 914.
  • filter it is meant that the event filter 916 determines the event type of the event sent by the pre-processing queue 914 and matches the event type to those desired by the subscriber 904.
  • the event filter 916 includes a content filter that specifies a subset of events by field values.
  • the publisher 902 invokes the publisher adapter 902b that validates a connection to the information broker 906. After the connection to the information broker has been successfully validated, the publisher adapter 902b publishes an event having an associated event type by sending the event to the pre-processor 912. After confirmation of proper registration and proper connection validation, the event is passed to the pre-processor queue 914 where it is stored until requested by the information broker 906.
  • FIG. 10 is an ente ⁇ rise computer system 1000 having multiple subscribers 1002 in accordance with an embodiment of the invention. It should be noted that the ente ⁇ rise computer system 1000 is one embodiment of the ente ⁇ rise computer system 900 having multiple subscribers 1002.
  • ente ⁇ rise computer system 1000 includes a first subscriber broker client 1002a having an associated subscriber queue 1004a and a second subscriber broker client 1002b having an associated subscriber queue 1004b.
  • the information broker 1008 determines if the event is of the type desired by either of the subscribers 1002a and 1002b. If the event is of the type desired by either or both of the subscribers 1002a and 1002b, then the event is stored in associated subscriber queues 1002b and 1002a in priority order until requested by either or both subscribers 1002a and 1002b.
  • the information broker 1000 is capable of managing any number of subscribers as well as any number of publishers. As shown in Figure 10, multiple identical subscribers can share a single broker queue resulting in improved load sharing or increased availability. In this way, the information broker 1006 guarantees exactly once in the order published delivery for shared queues as well as single subscriber queues. Because all events flow through them, information brokers are well suited for event monitoring tools. But they are also potential performance bottlenecks. Administrators can make performance trade offs by selecting the storage mechanism the broker uses for queuing events and other data. Guaranteed storage uses a robust commit procedure that is extremely reliable and necessarily slow. Volatile storage is memory-based; it is fast but vulnerable to power and other failures. Persistent storage occupies the middle ground, trusting operating system asynchronous I/O to write events to disk. Event encryption and checksumming are other performance affecting options that administrators can enable or disable for each event type a broker handles.
  • FIG 11 shows an information broker 1102 queue sharing in accordance with an embodiment of the invention.
  • the information broker 1102 "jumps the queue” to keep queue sharing subscribers busy while ensuring that they can rely on side effects with respect to events from one publisher.
  • three clients, A, B and C are publishing events of the same type to the information broker 1102.
  • the information broker 1102 will hand first subscriber (S,) the first event from publisher A.
  • the information broker 1102 hands the second event from publisher B to the second subscriber S 2
  • the third event, also from publisher A, is next in the queue.
  • the third event also from A cannot be processed until the processing of the first event from A is completed by the first subscriber S,.
  • the information broker 1102 understands this conflict and "jumps the queue" to deliver the fourth event (from publisher C) to subscriber S 2 . In this way, the information broker 1102 preserves pre-publisher event delivery order to subscribers S, and S 2 .
  • Figure 12 in accordance with an embodiment of the invention, is an ente ⁇ rise computer system 1200 having multiple cooperating information brokers.
  • the ente ⁇ rise computer system 1200 includes a publisher broker clients 1202 through 1206 multiply connected to multiple information brokers 1212 through 1216.
  • the information brokers 1212 through 1216 are in turn connected to subscribers 1222 through 1226 as deemed appropriate.
  • Brokers can be added while other brokers are running.
  • Multiple information brokers make the architecture scalable; it can meet increasing volumes with added capacity, and provide worldwide coverage without sacrificing fast local response and can be configured in any topology.
  • Information brokers deliver events to each other using an asynchronous store and forward technique.
  • a broker When a broker receives an event that a neighbor has subscribed to but the neighbor is unreachable, the broker reacts as it does for any subscriber: It queues the event and delivers it when the subscribing broker comes back up. If a broker is to be down for an extended period, an administrator can notify the broker's neighbors, which will then recompute routes and attempt to deliver messages that have been queued for the down broker, while maintaining the delivery order guarantees.
  • Agents are broker clients that use events to monitor and control business processes. They apply business rules and data transformations to subscribed events and publish the results. For example, a simple agent might decide which overdue accounts receive reminder notices. It could do so by subscribing to the InvoiceSent and PaymentReceived event types. If, 60 days after an invoice has been sent, a payment has not been received, the agent publishes a PrintReminder event. A bill printing resource, which subscribes to PrintReminder, prints the notice. Notice what software must be modified if the rule for printing reminders changes: the agent alone. The resources that publish InvoiceSent and PaymentReceived events, and the resource that subscribes to Printiteminder are unaffected by the rule change. Although this example is trivially simple, the technique of concentrating business rules in agents can be extended to arbitrarily complex business processes.
  • Underlying all elements of the ente ⁇ rise computer system 300 is a security model that addresses, for example, user and/or broker client authorization, event privacy and integrity, and the like.
  • Security properties are associated with client groups in that all members of a client group have the same security properties.
  • Each client group lists the types of events that members of the group are authorized to send (publish or deliver) and the types of events they are authorized to receive (by subscription or reply).
  • a particular broker client can publish a sensitive event (ChangeS alary, say), only if an administrator has made the broker client's type a member of a client group that is authorized to publish that type of event for example, the "human resources" client group.
  • each client has an associated access label indicative of the kinds of data that the associated client can see.
  • the access labels are assigned by an access label adapter included in the information broker.
  • Events have what is referred to as control labels which indicate the type of data contained in the event type data field. Events also have associated publisher labels indicating the security level possessed by the publisher. As described above, the control and publisher labels are stored in the event envelop and the publisher sets the control label whereas the information broker sets the publication label from the publisher's client label.
  • an information broker checks access labels when the event is sent to the client in order to assure that, for example, the client label "dominates" the event label.
  • the client label By dominate, it is meant that the client label has at least as high a security level as the event.
  • a client 1 has an associated client label of [5,4, 1] then an event 1 having an event label of [5, 1] can be received by the client.
  • an event 2 having an event label of [5,2] cannot be received by the client.
  • an access label adapter provides the access labels to the information broker.
  • the access labels are stored in an external resource such as a memory device.
  • a broker client instance When a broker client instance opens a connection to a broker, it asks to join a particular client group, which means to assume the properties of that client group.
  • the broker verifies the client's membership in one of two ways.
  • FIG. 13 is a flowchart detailing a process 1300 of verifying client membership in accordance with an embodiment of the invention.
  • the process of verification includes determining is a client group is available 1302. If the client group is not available, the connection is rejected 1304. If the client group is available, however, it is then determined if the client has a digital certificate attesting to its identity 1306. If client does not have a digital certificate, the broker then compares the client's network address with the client group's network access lists 1308. In the described embodiment, these lists, also established by an administrator, restricts membership in a client group to clients running on the hosts or residing in the subnets named in the list. Although network access lists are less secure than digital certificates, they are also less demanding of computing and administrative resources and can be appropriate for intranet use. If the comparison is not valid, then the connected is rejected 1304. Otherwise, the connection is accepted 1310.
  • certificates are digitally signed by a Certification Authority (CA) of which an administrator enters in the broker a list of well known and trusted CAs.
  • the client has a digital certificate, it is presented to the information broker 1312. It is then determined if the identity named in the digital certificate is a member of the client group 1314. If not a member of the client group, then the connection is rejected 1304, otherwise, it is determined if a access label is required 1316. If an access label is required, then an access label is obtained from an access label adapter 1318, otherwise, the broker it is determined if the broker is authenticated 1320 so the client cannot fooled by a rogue application pretending it's an information broker. If the broker is not authenticated, then the connection is rejected 1304, otherwise the connection is accepted 1310.
  • the client group properties specify whether the events sent between the client and the broker are encrypted for privacy and/or digitally signed for integrity.
  • a subscriber can find out if the event traveled exclusively over secure links, even in a multi broker situation.
  • a broker client can be a member of multiple client groups. For each client group it wants to join concurrently, a client opens a separate channel to the broker. In this way, a client can send or receive the events associated with one client group in encrypted form, and the events associated with another client group in clear form thus incurring the overhead of encryption only for those events whose sensitivity justifies the expense.
  • FIG 14 is an illustration of an ente ⁇ rise computer system 1400 having an access label adapter 1402 arranged to provide a subscriber authorization mask in accordance with an embodiment of the invention.
  • the ente ⁇ rise computer system 1400 is one embodiment of the ente ⁇ rise computer system 900 shown in Figure 9.
  • the authentication server 1402 provides an authorization mask in the form of access labels indicative of the events for which a particular subscriber 904 can access.
  • the access labels are used by the filter 916 to filter all incoming events determining, thereby, the subscribers 904 which are allowed access to the particular event and contents thereof
  • FIG. 15 is a flowchart detailing an authentication process 1600 carried out in an ente ⁇ rise computer system in accordance with an embodiment of the invention.
  • the match filter receives the event and determines the event type 1602.
  • a counter J is initialized to 0 1604 and incremented 1606. It is then determined whether a first subscriber wants the event type 1608. If it is determined that the first subscriber wants the event type, it is then determined if the event instance content matches the first subscriber filter 1610. If it is determined that the instance content matches the first subscriber filter, it is then determined if the first subscriber has permission to receive the event including the received authorization mask 1612. If the first subscriber has permission to receive the event, the event is delivered to the first subscriber 1614. Control then passes to the next subscriber, if any.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Resources & Organizations (AREA)
  • General Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Signal Processing (AREA)
  • Data Mining & Analysis (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Economics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Computer And Data Communications (AREA)

Abstract

A scalable enterprise computer system having the capability to provide transaction security as well as providing subscription filtering is described. As a method of transacting an event in the enterprise computer system a connection with an information broker by the publisher established after which it is determined if the event registered with the information broker. Next, a subscription corresponding to the registered event by a subscriber is accepted by the information broker, after which a platform neutral event is created that is then populated with event content which is then published to and received by the information broker.

Description

ENTERPRISE COMPUTER SYSTEM
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates generally to the field of digital data processing systems, and more particularly to integrating the flow of information between a variety of computing tools in an enterprise computing environment.
2. Description of the Related Art
In modem enterprise computing environments, that is, computer systems for use in an office environment in a company, for example, a number of personal computers, workstations, mainframes, and the like along with other devices such as large mass storage subsystems, network interfaces, as well as interfaces to the public telephony systems may be interconnected to provide an integrated environment in which information may be shared among various users. Typically, users may be performing a variety of operations, including order receipt, manufacturing, shipping, billing, inventory control, and other operations in which sharing of data on a real time basis may provide a significant advantage over, for example, maintaining separate records and attempting to reconcile them later.
Several strategies have been developed to allow for sharing of information in an enterprise computing environment. One problem that arises in an enteφrise computing environment is that often the various users are using programs which have been developed based on a data or programming model that assumes that the data they receive, process, and store will be unique to the program, which models often are convenient for the program developer for the particular type of operations performed by the program. However, in one strategy, all types of programs would be constrained to the same type data or programming model. There are several problems with this strategy. For example, all types of programs would be constrained to the same type data or programming model, which may be efficient for some types of programs but very inefficient for other types of programs. In addition, such a strategy would require all program developers to conform to a single data or programming model, which may reduce competitive advantages which developer's programs may be able to otherwise have if they would be able to use a data or programming model of their own choosing.
Another strategy is to provide an information exchange engine that can translate data between model's formats of various programs which may be used in the enteφrise computing environment. While this will allow each program to have its own data or programming model, it may require acquiring and maintaining exchange engines for a number of programs and a user to select an appropriate exchange engine when importing or exporting information form another program. In addition, as the number of users and/or exchange engines increases in order to meet the needs of an expanding system, the interconnections between each of the components becomes prohibitively complex forming a "spaghetti like mass". This increase in complexity effectively limits the scalability of an integrated set of computer resources since any additional computer resources requires reconfiguring the entire system.
Figure 1 is an illustration of a conventional enteφrise computing system 100. The enteφrise computing system 100 includes exchange engines 102-110 capable of accessing and cross connection of any number and type of information platforms 112 and 114. Such platforms include various database management systems, applications programs, large mass storage subsystems, network interfaces, as well as interfaces to the public telephony systems such as to the Internet. The database management applications generally include computer programs that are executed in conventional manner by digital computer systems. Typically, the exchange engines include computer programs executed by digital computer systems (which may be the same digital computer systems on which their respective applications programs are executed). The exchange engines and the application programs are processed and maintained on a number of digital computer systems interconnected by, for example, a network 116 which transfers data access requests, translated data access requests and responses between the computer systems on which the exchange engines and application programs are processed. As can be seen, as the enteφrise computer system expands, the number of application programs and associated digital computer systems increase to meet the needs of the expanded enteφrise computer system. This increase in the number of digital computers greatly increases the complexity of the network 116 which in turn greatly increases the resources required to maintain and upgrade the system 100.
Transaction security is also of paramount importance since users must be certain that all transactions carried out over the enteφrise computer system are secure. By secure, it is meant that sensitive information, such as account numbers, account balances, passwords, etc. are safe from unauthorized users. Conventionally, enteφrise computer systems have used various encryption type solutions to these problems. Unfortunately, although encryption type security measures can be useful in protecting information itself, providing transactional security is more problematic. By transactional security, it is meant that a subscriber, for example, is only able to receive events (authorized) of a specific security level, such as secret, or lower such as confidential. However, this same subscriber will not be authorized to receive higher level security, such as top secret.
In view of the foregoing, it would be advantageous and therefore desirable to have a scalable enteφrise computer system having the capability to provide transaction security. In addition, the scalable enteφrise computer system should also be capable of providing subscription filtering.
SUMMARY OF THE INVENTION
A scalable enteφrise computer system having the capability to provide transaction security as well as providing subscription filtering is disclosed. As a method of transacting an event in the enteφrise computer system, a connection between an information broker and an event publisher is established, the event to be published is then determined to be registered with the information broker. Next, if the registered event is indentified as being subscribed to by the subscriber, then the registered event is populated with event content. The populated event is then published to and received by the information broker.
In a preferred embodiment, only those received events that are determined by the information broker to be valid events are published an appropriate subscriber(s).
In another embodiment, an enteφrise computer system is described. The enteφrise computer system includes a publisher capable of publishing an event and an information broker validly coupled to the publisher arranged to receive the published event. The enteφrise computer system further includes a content filter coupled to the information broker and a subscriber arranged to receive a properly subscribed to published event.
In a preferred embodiment, the information broker determines whether or not the received event is the properly subscribed to event by determining if an event type corresponding to the published event matches a subscription associated with the subscriber, whether or not an event security level corresponding to the event is verified, determining whether or not an event content matches the content filter, and whether or not an event authorization is valid. In those cases where the published event's type matches the subscription and when the event security level is verified, and when the event content matches the content filter, and when the event authorization is valid, then the event is the properly subscribed to event as determined by the information broker.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention is illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings, wherein like reference numerals refer to analogous or similar elements to facilitate ease of understanding, and in which:
Figure 1 is an illustration of a conventional enteφrise computing system;
Figure 2 is a block diagram of a general puφose computer system suitable for carrying out the processing according to the present invention; Figure 3 is an enteφrise computer system in accordance with an embodiment of the invention;
Figure 4 A shows how a relational data base (RDB) adapter translates an event to SQL in accordance with an embodiment of the invention;
Figure 4B shows a C++ application adapter mapping an event to data structures in a memory in accordance with an embodiment of the invention;
Figure 5 A shows an event in accordance with an embodiment of the invention;
Figure 5B shows an exemplary inventory control event in accordance with an embodiment of the invention.
Figure 6A is a flowchart detailing a process 600 of establishing a subscription to an event in accordance with an embodiment of the invention;
Figure 6B is a flowchart detailing a process for publishing a subscripted to event in accordance with an embodiment of the invention;
Figure 7 is a flowchart detailing a process of whereby an information broker delivers an event to a subscriber in accordance with an embodiment of the invention;
Figure 8 is a flowchart detailing the process of request/reply in accordance with an embodiment of the invention;
Figure 9 is an enteφrise computer system in accordance with an embodiment of the invention; Figure 10 is an enteφrise computer system having multiple subscribers in accordance with an embodiment of the invention;
Figure 11 shows an information broker queue sharing in accordance with an embodiment of the invention;
Figure 12 in accordance with an embodiment of the invention, is an enteφrise computer system having multiple cooperating information brokers;
Figure 13 is a flowchart detailing a process of verifying client membership in accordance with an embodiment of the invention;
Figure 14 in accordance with an embodiment of the invention, is an enteφrise computer system having an authentication server; and Figure 15 is a flowchart detailing a process of authenticating an event based upon a subscriber authorization mask in accordance with an embodiment of the invention.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
The present invention employs various computer-implemented operations involving data stored in computer systems. These operations include, but are not limited to, those requiring physical manipulation of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. The operations described herein that form part of the invention are useful machine operations. The manipulations performed are often referred to in terms, such as, producing, identifying, running, determining, comparing, executing, downloading, or detecting. It is sometimes convenient, principally for reasons of common usage, to refer to these electrical or magnetic signals as bits, values, elements, variables, characters, data, or the like. It should remembered however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities.
The present invention also relates to a device, system or apparatus for performing the aforementioned operations. The system may be specially constructed for the required puφoses, or it may be a general puφose computer selectively activated or configured by a computer program stored in the computer. The processes presented above are not inherently related to any particular computer or other computing apparatus. In particular, various general puφose computers may be used with programs written in accordance with the teachings herein, or, alternatively, it may be more convenient to construct a more specialized computer system to perform the required operations.
Figure 2 is a block diagram of a general puφose computer system 200 suitable for carrying out the processing according to the present invention. Computer system 200, made up of various subsystems described below, includes at least one microprocessor subsystem (also referred to as a central processing unit, or (CPU) 202). That is, CPU 202 can be implemented by a single-chip processor or by multiple processors. CPU 202 is a general puφose digital processor which controls the operation of the computer system 200. Using instructions retrieved from memory, the CPU 202 controls the reception and manipulation of input data, and the output and display of data on output devices.
CPU 202 is coupled bi-directionally with a primary storage device 204, typically random access memory (RAM), and uni-directionally with a primary storage device 206, typically a read-only memory (ROM), via a memory bus 208. As is well known in the art, primary storage device 204 can be used as a general storage area and as scratch-pad memory, and can also be used to store input data and processed data. The primary storage device 204 can also store programming instructions and data, in the form of data objects or constructs representing units of information in addition to other data and instructions for processes operating on CPU 202. The primary storage device 204 can also be used for fast transfer of data and instructions in a bi-directional manner over the memory bus 208. Also as well known in the art, primary storage device 206 typically includes basic operating instructions, program code, data and objects used by the CPU 202 to perform its functions. Primary storage devices 204 and 206 may include any suitable computer-readable storage media, described below, depending on whether, for example, data access needs to be bi-directional or uni-directional. CPU 202 can also directly and very rapidly retrieve and store frequently needed data in a cache memory 120.
A removable mass storage device 222 provides additional data storage capacity or the computer system 200, and is coupled either bi-directionally or uni-directionally to CPU 202 via a peripheral bus 224. For example, a specific removable mass storage device commonly known as a CD-ROM typically passes data uni-directionally to the CPU 202, whereas a floppy disk can pass data bi-directionally to the CPU 202. Storage device 222 may also include computer-readable media such as magnetic tape, Rash memory, signals embodied on a carrier wave, PC-CARDS, portable mass storage devices, holographic storage devices, and other storage devices. A fixed mass storage device 216 also provides additional data storage capacity and is coupled bi-directionally to CPU 202 via peripheral bus 224. The most common example of mass storage device 216 is a hard disk drive. Generally, access to these media is slower than access to primary storage device 204 and 206. Mass storage device 222 and 216 generally store additional programming instructions, data, and the like that typically are not in active use by the CPU 202. It will be appreciated that the information retained within mass storage device 222 and 216 may be incoφorated, if needed, in standard fashion as part of primary storage device 204 (e.g. RAM) as virtual memory. In addition to providing CPU 202 access to storage subsystems, the peripheral bus 224 is used to provide access other subsystems and devices as well. In the described embodiment, these include a display monitor 218 and adapter 220, a printer device 222, a network interface 224, an auxiliary input/output device interface 226, a sound card 228 and speakers 230, and other subsystems as needed.
The network interface 224 allows CPU 202 to be coupled to another computer, computer network, or telecommunications network using a network connection as shown. Through the network interface 224, it is contemplated that the CPU 202 might receive information e.g., data objects or program instructions, from another network, or might output information to another network in the course of performing the above described method steps. Information, often represented as a sequence of instructions to be executed on a CPU, may be received from and outputted to another network, for example, in the form of a computer data signal embodied in a carrier wave. An interface card or similar device and appropriate software implemented by CPU 202 can be used to connect the computer system 200 to an external network and transfer data according to standard protocols. That is, method embodiments of the present invention may execute solely upon CPU 202, or may be performed across a network such as the Internet, intranet networks, or local area networks, in conjunction with a remote CPU that shares a portion of the processing. Additional mass storage devices (not shown) may also be connected to CPU 202 through network interface 224.
Auxiliary I/O device interface 226 represents general and customized interfaces that allow the CPU 202 to send and, more typically, receive data from other devices such as microphones, touch-sensitive displays, transducer card readers, tape readers, operation of the computer system 200. Using instructions retrieved from memory, the CPU 202 controls the reception and manipulation of input data, and the output and display of data on output devices. CPU 202 is coupled bi-directionally with a first primary storage device 204, typically random access memory (RAM), and uni-directionally with a second primary storage area 206, typically a read-only memory (ROM), via a memory bus 208. As is well known in the art, primary storage device 204 can be used as a general storage area and as scratch-pad memory, and can also be used to store input data and processed data. It can also store programming instructions and data, in the form of data objects or constructs representing units of information in addition to other data and instructions for processes operating on CPU 202, and is used typically used for fast transfer of data and instructions in a hi-directional manner over the memory bus 208. Also as well known in the art, primary storage device 206 typically includes basic operating instructions, program code, data and objects used by the CPU 202 to perform its functions. Primary storage devices 204 and 206 may include any suitable computer readable storage media, described below, depending on whether, for example, data access needs to be bi-directional or uni-directional. CPU 202 can also directly and very rapidly retrieve and store frequently needed data in a cache memory 220. A removable mass storage device 222 provides additional data storage capacity or the computer system 200, and is coupled either bi-directionally or uni-directionally to CPU 202 via a peripheral bus 224. For example, a specific removable mass storage device commonly known as CD-ROM typically passes data uni-directionally to the CPU 202, whereas a floppy disk can pass data bi-directionally to the CPU 202. Storage device 222 may also include computer-readable media such as magnetic tape, flash memory, signals embodied on a carrier wave, PC-CARDS, portable mass storage devices, holographic storage devices, and other storage devices. A fixed mass storage 116 also provides additional data storage capacity and is coupled bi-directionally to CPU 202 via peripheral bus 224. The most common example of mass storage device 216 is a hard disk drive. Generally, access to these media is slower than access to primary storage device 204 and 206. Mass storage device 222 and 216 generally store additional programming instructions, data, and the like that typically are not in active use by the CPU 202. It will be appreciated that the information retained within mass storage device 222 and 216 may be incoφorated, if needed, in standard fashion as part of primary storage device 204 (e.g. RAM) as virtual memory.
In addition to providing CPU 202 access to storage subsystems, the peripheral bus 224 is used to provide access to other subsystems and devices as well. In the described embodiment, these include a display monitor 218 and adapter 220, a printer device 222, a network interface 224, an auxiliary input/output device interface 226, a sound card 228 and speakers 230, and other subsystems as needed.
The network interface 224 allows CPU 202 to be coupled to another computer, computer network, or telecommunications network using a network connection as shown. Through the network interface 224, it is contemplated that the CPU 202 might receive information, e.g., data objects or program instructions, from another network, or might output information to another network in the course of performing the above described method steps. Information, often represented as a sequence of instructions to be executed on a CPU, may be received from and output to another network, for example, in the form of a computer data signal embodied in a carrier wave. An interface card or similar device and appropriate software implemented by CPU 202 can be used to connect the computer system 200 to an external network and transfer data according to standard protocols, that is, method embodiments of the present invention may execute solely upon CPU 202, or may be performed across a network such as the internet, intranet networks, or local area networks, in conjunction with a remote CPU that shares a portion of the processing. Additional mass storage devices (not shown) may also be connected to CPU 202 through network interface 224.
In addition, embodiments of the present invention further relate to computer storage products with a computer readable medium that contain program code for performing various computer implemented operations. The computer readable medium is any data storage device that can store data which can thereafter be read by a computer system, the media and program code may be those specially designed and constructed for the puφoses of the present invention, or they may be of the kind well known to those of ordinary skill in the computer software arts. Examples of computer readable media include, but are not limited to, all the media mentioned above: magnetic media such as hard disks, floppy disks, and magnetic tape; optical media such as CD-ROM disks; magneto-optical media such as floptical disks; and specially configured hardware devices such as application-specific integrated circuits (ASICs), programmable logic devices (PLDs), and ROM and RAM devices.
The computer-readable medium can also be distributed as a data signal embodied in a carrier wave over a network of coupled computer systems so that the computer-readable code is stored and executed in a distributed fashion. Examples of program code include both machine code, as produced, for example, by a compiler, or files containing higher level code that may be executed using an inteφreter.
It will be appreciated by those skilled in the art that the above described hardware and software elements are of standard design and construction. Other computer systems suitable for use with the invention may include additional or fewer subsystems. In addition, memory bus 208, peripheral bus 224, and local bus 234 are illustrative of any interconnection scheme serving to link the subsystems. For example, voice or handwriting recognizers, biometrics readers, cameras, portable mass storage devices, and other computers. In addition, embodiments of the present invention further relate to computer storage products with a computer readable medium that contain program code for performing various computer-implemented operations. The computer-readable medium is any data storage device that can store data which can thereafter be read by a computer system. The media and program code may be those specially designed and constructed for the puφoses of the present invention, or they may be of the kind well known to those of ordinary skill in the computer software arts. Examples of computer-readable media include, but are not limited to, all the media mentioned above: magnetic media such as hard disks, floppy disks, and magnetic tape; optical media such as CD-ROM disks; magneto-optical media such as floptical, disks; and specially configured hardware devices such as application-specific integrated circuits (ASICs), programmable logic devices (PLDs), and ROM and RAM devices. The computer-readable medium can also be distributed as a data signal embodied in a carrier wave over a network of coupled computer systems so that the computer readable code is stored and executed in a distributed fashion. Examples of program code include both machine code, as produced, for example, by a compiler, or files containing higher level code that may be executed using an inteφreter. It will be appreciated by those skilled in the art that the above described hardware and software elements are of standard design and construction. Other computer systems suitable for use with the invention may include additional or fewer subsystems. In addition, memory bus 208, peripheral bus 224, and local bus 234 are illustrative of any interconnection scheme serving to link the subsystems. For example, a local bus could be used to connect the CPU to fixed mass storage device 216 and display adapter 220. The computer system shown in Figure 2 is but an example of a computer system suitable for use with the invention. Other computer architectures having different configurations of subsystems may also be utilized.
Referring to Figure 3, an enteφrise computer system 300, in accordance with an embodiment of the invention, is shown. The enteφrise computer system 300 includes any number of information resources organized around an information broker 302. Information resources are producers and/or consumers of coφorate information, for example, and can include networks, such as Local Area Network (LAN) 304 that in turn includes any number of individual computer systems 306a and 306b, for example. Such computer systems can take the form of computer system 200 shown in Figure 2 and as such can include mass storage devices, network interfaces, etc. In addition to LAN 302, information resources can include conventional to databases represented by mass storage unit 310, applications resident on computers 312 and 314, as well as the internet, the mass storage device 310 typically stores information in the form of useful documents.
Typically, each of the individual computer systems included in the enteφrise computer system 300 is coupled to an associated storage device 308. For example, the computer systems 306a and 306b of the LAN 304 each have an associated storage device 308a and 308b, respectively. One or more of these storage devices can be utilized to store various data objects or documents which may be periodically accessed and processed by a user within the enteφrise computer system 300. The enteφrise computer system 300 also includes a mainframe computer 316. The mainframe computer 316 may also be connected to a storage device 318 capable of acting as a remote storage device for the LAN 304, for example.
As those skilled in the art can appreciate, the components of the enteφrise computer system 300 may be located a great geographical distance from each other. By way of example, the mainframe 316 may be located in, for example, San Francisco, while the LAN 304 may be located in Los Angeles. The enteφrise computer system 300 also includes adapters 320 through 330 arranged to connect associated information resource to the information broker 302. By way of example, the adapter 320 connects LAN 304 to the information broker 302 while the adapter 328 connects the mass storage device 310 to the information broke 302. the combination of an information resource and its associated adapter is referred to as a broker client. By way of example, the mainframe 316 and its associated adapter 322 form a broker client 332.
In the described embodiment, adapters integrate diverse information resources by enabling them to exchange a common unit of information referred to hereinafter as the event. Events are messages exchanged by broker clients. To send an event, a broker client publishes it, conversely, to receive events of a particular type, a broker client subscribes to that event type. Each event is typed to distinguish it from other events, and self-describing, so it can be filtered by its contents. Events constitute both a common currency for information exchange and a common language suitable for describing and discussing disparate coφorate information. Agents are software components that embody business processes by subscribing to particular types of events, applying business rules to those events, and as a result, publishing other types of events. As shown in Figure 3, agents 334 and 336 are coupled to the information broker 302 providing thereby the capability of applying any desired business rule to any event received by the information broker 302.
Typically, users in different portions of the enteφrise computer system 300 use substantially different computing platforms since each user may in fact have very different data processing requirements. These heterogeneous computing platforms can include, for example application programs suitable for processing critical business transactions such as order entry, shipping, billing, receivables, and so on resident on computer 312 or 314. Since many of these applications come in "package" form (i.e., bought as turn key application with little or no user knowledge of the software itself besides being able to use it) many users are either reluctant or incapable of modifying the application software to make it compatible with other computing platforms.
Just as many users use multiple platform types in the enteφrise computer system 300, many users also have adopted multiple programming models. Such programming models include, for example, transactions and remote procedure calls (RPC), COBOL and C++, relational and hierarchical databases, and Visual Basic and HTML forms. As known in the art, each programming model typically includes programming code based upon different models.
Since an adapter translates between local information currency of a particular broker client combination to the common information currency of events, any of the heterogeneous computing platforms resident in the enteφrise computer system 300 are capable of communication. By way of example, as shown in Figure 4A a relational database (RDB) adapter 402 translates an event 404 to SQL, while in Figure 4B, a C++ application adapter 412 maps an event 414 to data structures in a memory 416.
Event
An event is typically a business event that is discovered or created by one resource and is of interest to other resources. By way of example, a coφoration can define events for their particular needs and practices related to marketing, billing, orders and shipments, manufacturing, employment, etc. Each event contains information particular to it, such as for example, Employee-Number or Invoice- Amount. Typically, each event contains sufficient information to completely characterize and analyze it without resorting to other resources, such as databases, which are subject to change. By way of example, Figure 5 A illustrates an event 500 in accordance with an embodiment of the invention. The event 500 includes an event type data field 502, an associated event data field 504, and an event envelop 506. In one embodiment of the invention, the event envelop 506 is populated by the system with system parameters, such as for example, transaction security fields, return addresses, etc. By way of example, assuming for this example that an event 508 associated with a manufacturing company is shown in Figure 5B. The event 508 then contains an event type data field 510 indicating for example, the event 508 pertains to inventory control. In this case, the associated event data field 512 would contain data fields specific to a particular inventory control transaction. Such transaction specific data fields would include, for example, a transaction type field 514, an Invoicenumber field 516, an Amount field 518, and a Transaction Date field 520. Other data fields can be included in the event data structure 500 at the discretion of the information resource producing the event 500. The associated event envelop 522 would then be populated by the system to include transaction security, return addresses, as well as control and publisher labels described below.
Event Transactions
Event producing resources publish events while event consuming resources subscribe to event types and receive events of those types. Some resources publish one set of events and subscribe to other types of events. Because event delivery is brokered, an unavailable subscriber never delays a publisher, and a subscriber only receives events when it is ready. The tasks of event queuing, routing, and delivery are the responsibilities of the information broker described shortly.
Figure 6A is a flowchart detailing a process 600 of establishing a subscription to an event in accordance with an embodiment of the invention. In order to establish a subscription to an event, a connection with an information broker 602 must be established. It is then determined if the event is registered with the information broker 604. If it is determined that the event is not registered with the information broker, then the subscription is rejected 606. If, however, it is determined that the event is registered with the information broker, then an output queue is created 608 and the subscription is accepted 610.
Figure 6B is a flowchart detailing a process 612 for publishing a subscripted to event in accordance with an embodiment of the invention. Once the subscription has been accepted as described in Figure 6A, a connection with the information broker in which the event is registered is established 614. A platform neutral event is then created and populated 616 after which the event is then published to the information broker 618 which then subsequently receives it 620.
Figure 7 is a flowchart detailing a process 700 whereby an information broker delivers an event to a subscriber in accordance with an embodiment of the invention. In an embodiment of the invention, in order to receive published events of a particular type, a broker client (referred to as a subscriber) must have entered a corresponding subscription with an information broker. Subscriptions can be registered manually by using administrative tools or automatically by adapters. There are two kinds of subscriptions, single session and multi session. A single session subscription remains effective unit the subscriber breaks the network connection with its broker. A multi session subscription persists until it is cancelled. When a multi session subscriber notifies an information broker that it is ready to receive events, the information broker delivers the events it has queued.
When an information broker receives a published event, it examines its subscription for the event type 702 and then determines if the event type matches the subscription 704. For each matching subscription, the information broker delivers, queues, or ignores the event, depending on whether the subscription is single session or multi session and whether the subscriber is running or not. The information broker determines if the event security level is verified 705 then determines if the event content matches a content filter 706. For each matching subscription, the information broker then determines if the event's authorization is valid 708. For all authorized events, the information broker then determines whether the matching subscription is a single session subscription or a multi-session subscription 710. If it is determined to be a multi-session subscription, the information broker then determines if the multi-session subscription is cancelled 712. If the multi-session subscription is cancelled, the information broker ignores the event and stops processing. If, however, the multi-session subscription is not cancelled, the information broker determines if the connection is valid 714. If the connection is valid, the information broker queues the event to the subscriber 720.
In addition to shielding publishers and subscribers from event delivery problems, including intermittent network failures, information brokers have important administrative functions They maintain registries of events that developers can browse. They provide data on publish and receive rates of resources, lengths of queues, and so on, exposing network problems and possibly indicating that a hardware upgrade may soon be in order. It should be noted that adding and deleting subscribers has no effect on publishers; neither does adding or deleting publishers affect subscribers. Publishers and subscribers can be altered, or even replaced, so long as the contract specified in their mutual event definitions is observed. Although the publish/subscribe model fits many resource communication needs, it does not fit all of them.
Figure 8 is a flowchart detailing the process 800 of request/reply in accordance with an embodiment of the invention. A broker client that provides a service subscribes to an event type that represents a request for that service 802. To obtain the service, a broker client publishes a request event containing a "return address" 804. The return address consists of the requestor's ID, possibly generated by the information broker, and a tag that distinguishes the event from others the requestor has published. The service provider receives the request event 806, performs the service 808, and copies the results and the return address into the reply event 810. Then, instead of publishing the reply, the service provider directs the broker to deliver it 812. Because the reply event contains the address of its sole recipient, the broker can queue or deliver it instantly, bypassing subscription matching and filtering. The recipient does not need a subscription to the reply event type, but must be a member of what is referred to as a client group that has permission to receive it; the service provider must be a member of a client group (i.e., associated group of clients) that has permission to send the reply type. By way of example, each client group lists the types of events that members of the group are authorized to send (publish or deliver) and the types of events they are authorized to receive (by subscription or reply).
Information Brokers One aspect of information brokers is that they guarantee that, with respect to a particular subscriber, events are delivered exactly once and same-priority events from one publisher are delivered in the order they were published. The first part of this guarantee frees subscribers from having to detect duplicate events, which they must do in enteφrise computer systems that deliver messages at least once. The second part enables publishers and subscribers to rely on event temporal effects. For example, suppose that a publisher publishes event A and then event B, and that a subscriber responds to event A by creating something that's needed for responding to event B-a database record, for example. If a network problem delays event A so that B arrives first, the subscriber would perform erroneously unless it is encumbered with logic for handling out-of-order arrivals. The event delivery guarantee is an example of concentrating complexity in information brokers to simplify associated broker clients.
Figure 9 is an enteφrise computer system 900 in accordance with an embodiment of the invention. It should be noted that enteφrise computer system 900 is one embodiment of the enteφrise computer system 300 shown in Figure 3. It should also be noted, that the connotation of publisher and subscriber is for sake of clarity only and it should be borne in mind that any broker-client can be a publisher or a subscriber as deemed appropriate.
The enteφrise computer system 900 includes a publisher 902, a subscriber 904, and an information broker 906. In the described embodiment, the publisher 902 includes a publisher information resource 902a connected to a publisher adapter 902b while the subscriber 904 includes a subscriber information resource 904a connected an associated subscriber adapter 904b. The information broker includes a pre-processor 912 connected to a pre-processing queue 914 arranged to store any event preprocessed and sent by the pre-processor 912. In one embodiment of the invention, the pre-processor 912 populates the event envelop that includes, for example, return address, content and publisher labels. In a preferred embodiment of the invention, the preprocessor 912 uses the various data fields included in the event envelop to appropriately process the event. The pre-processing queue 914 is, in turn, connected to an event filter 916. The event filter 916 is used by the information broker 906 to filter those events received from the pre-processing queue 914. By filter, it is meant that the event filter 916 determines the event type of the event sent by the pre-processing queue 914 and matches the event type to those desired by the subscriber 904. In one embodiment of the invention, the event filter 916 includes a content filter that specifies a subset of events by field values. For example, a subscriber to InvoiceSent events might attach a content filter specifying Invoice Amount $50, 000; the broker will not deliver events with smaller amounts to this subscriber. Content filtering by brokers is made possible by the self-describing and strong typing features of events. In operation, the publisher 902 invokes the publisher adapter 902b that validates a connection to the information broker 906. After the connection to the information broker has been successfully validated, the publisher adapter 902b publishes an event having an associated event type by sending the event to the pre-processor 912. After confirmation of proper registration and proper connection validation, the event is passed to the pre-processor queue 914 where it is stored until requested by the information broker 906. Once requested, the event is passed to the event filter 916, which can include a content-filter described above. Once the event is filtered, the information broker 906 stores the event in queue 918 and then queries the subscriber types requested by the subscriber 904. If the filtered event is desired by the subscriber 904, the event is passed to the subscriber adapter 904b where it is converted to a platform consistent with the subscriber information resource 904a. Figure 10 is an enteφrise computer system 1000 having multiple subscribers 1002 in accordance with an embodiment of the invention. It should be noted that the enteφrise computer system 1000 is one embodiment of the enteφrise computer system 900 having multiple subscribers 1002. Accordingly, the enteφrise computer system 1000 will be described with reference to elements shown in Figure 9 consistent with those portions of enteφrise system 900 already described and discussed. As shown in Figure 10, enteφrise computer system 1000 includes a first subscriber broker client 1002a having an associated subscriber queue 1004a and a second subscriber broker client 1002b having an associated subscriber queue 1004b. When an event is processed by the event filter 1006, the information broker 1008 determines if the event is of the type desired by either of the subscribers 1002a and 1002b. If the event is of the type desired by either or both of the subscribers 1002a and 1002b, then the event is stored in associated subscriber queues 1002b and 1002a in priority order until requested by either or both subscribers 1002a and 1002b. In this way, the information broker 1000 is capable of managing any number of subscribers as well as any number of publishers. As shown in Figure 10, multiple identical subscribers can share a single broker queue resulting in improved load sharing or increased availability. In this way, the information broker 1006 guarantees exactly once in the order published delivery for shared queues as well as single subscriber queues. Because all events flow through them, information brokers are well suited for event monitoring tools. But they are also potential performance bottlenecks. Administrators can make performance trade offs by selecting the storage mechanism the broker uses for queuing events and other data. Guaranteed storage uses a robust commit procedure that is extremely reliable and necessarily slow. Volatile storage is memory-based; it is fast but vulnerable to power and other failures. Persistent storage occupies the middle ground, trusting operating system asynchronous I/O to write events to disk. Event encryption and checksumming are other performance affecting options that administrators can enable or disable for each event type a broker handles.
Figure 11 shows an information broker 1102 queue sharing in accordance with an embodiment of the invention. The information broker 1102 "jumps the queue" to keep queue sharing subscribers busy while ensuring that they can rely on side effects with respect to events from one publisher. As shown in Figure 11, three clients, A, B and C are publishing events of the same type to the information broker 1102. Two subscribers S, and S2 sharing a queue 1104 which is holding four of these same type events in it. When the first subscriber (S,) is ready for an event, the information broker 1102 will hand first subscriber (S,) the first event from publisher A. When the second subscriber (S2) is ready to receive an event, the information broker 1102 hands the second event from publisher B to the second subscriber S2 The third event, also from publisher A, is next in the queue. In the case that the subscriber S,, is still processing the first event from A, the third event also from A cannot be processed until the processing of the first event from A is completed by the first subscriber S,. The information broker 1102 understands this conflict and "jumps the queue" to deliver the fourth event (from publisher C) to subscriber S2. In this way, the information broker 1102 preserves pre-publisher event delivery order to subscribers S, and S2.
Multiple Information Brokers
No matter what storage and security options are selected, sufficient event traffic volume can swamp a broker; moreover, delivery times can be unacceptable if events published on one side of the world must pass through a broker located on the other side. To accommodate variations in both volumes and geography, the architecture supports multiple cooperating information brokers.
Figure 12, in accordance with an embodiment of the invention, is an enteφrise computer system 1200 having multiple cooperating information brokers. The enteφrise computer system 1200 includes a publisher broker clients 1202 through 1206 multiply connected to multiple information brokers 1212 through 1216. The information brokers 1212 through 1216 are in turn connected to subscribers 1222 through 1226 as deemed appropriate. Brokers can be added while other brokers are running. Multiple information brokers make the architecture scalable; it can meet increasing volumes with added capacity, and provide worldwide coverage without sacrificing fast local response and can be configured in any topology. Information brokers deliver events to each other using an asynchronous store and forward technique. When a broker receives an event that a neighbor has subscribed to but the neighbor is unreachable, the broker reacts as it does for any subscriber: It queues the event and delivers it when the subscribing broker comes back up. If a broker is to be down for an extended period, an administrator can notify the broker's neighbors, which will then recompute routes and attempt to deliver messages that have been queued for the down broker, while maintaining the delivery order guarantees.
Agents
Agents are broker clients that use events to monitor and control business processes. They apply business rules and data transformations to subscribed events and publish the results. For example, a simple agent might decide which overdue accounts receive reminder notices. It could do so by subscribing to the InvoiceSent and PaymentReceived event types. If, 60 days after an invoice has been sent, a payment has not been received, the agent publishes a PrintReminder event. A bill printing resource, which subscribes to PrintReminder, prints the notice. Notice what software must be modified if the rule for printing reminders changes: the agent alone. The resources that publish InvoiceSent and PaymentReceived events, and the resource that subscribes to Printiteminder are unaffected by the rule change. Although this example is trivially simple, the technique of concentrating business rules in agents can be extended to arbitrarily complex business processes.
Security
Underlying all elements of the enteφrise computer system 300 is a security model that addresses, for example, user and/or broker client authorization, event privacy and integrity, and the like. Security properties are associated with client groups in that all members of a client group have the same security properties.
Each client group lists the types of events that members of the group are authorized to send (publish or deliver) and the types of events they are authorized to receive (by subscription or reply). A particular broker client can publish a sensitive event (ChangeS alary, say), only if an administrator has made the broker client's type a member of a client group that is authorized to publish that type of event for example, the "human resources" client group.
In one embodiment of the invention, each client has an associated access label indicative of the kinds of data that the associated client can see. In the described embodiment, the access labels are assigned by an access label adapter included in the information broker.
Events have what is referred to as control labels which indicate the type of data contained in the event type data field. Events also have associated publisher labels indicating the security level possessed by the publisher. As described above, the control and publisher labels are stored in the event envelop and the publisher sets the control label whereas the information broker sets the publication label from the publisher's client label.
During operation, an information broker checks access labels when the event is sent to the client in order to assure that, for example, the client label "dominates" the event label. By dominate, it is meant that the client label has at least as high a security level as the event. By way of example, if a client 1 has an associated client label of [5,4, 1] then an event 1 having an event label of [5, 1] can be received by the client. However, an event 2 having an event label of [5,2] cannot be received by the client.
In one embodiment of the invention, an access label adapter provides the access labels to the information broker. Typically, the access labels are stored in an external resource such as a memory device.
When a broker client instance opens a connection to a broker, it asks to join a particular client group, which means to assume the properties of that client group. The broker verifies the client's membership in one of two ways.
Figure 13 is a flowchart detailing a process 1300 of verifying client membership in accordance with an embodiment of the invention. The process of verification includes determining is a client group is available 1302. If the client group is not available, the connection is rejected 1304. If the client group is available, however, it is then determined if the client has a digital certificate attesting to its identity 1306. If client does not have a digital certificate, the broker then compares the client's network address with the client group's network access lists 1308. In the described embodiment, these lists, also established by an administrator, restricts membership in a client group to clients running on the hosts or residing in the subnets named in the list. Although network access lists are less secure than digital certificates, they are also less demanding of computing and administrative resources and can be appropriate for intranet use. If the comparison is not valid, then the connected is rejected 1304. Otherwise, the connection is accepted 1310. In one embodiment of the invention, certificates are digitally signed by a Certification Authority (CA) of which an administrator enters in the broker a list of well known and trusted CAs.
Returning to 1304, if the client has a digital certificate, it is presented to the information broker 1312. It is then determined if the identity named in the digital certificate is a member of the client group 1314. If not a member of the client group, then the connection is rejected 1304, otherwise, it is determined if a access label is required 1316. If an access label is required, then an access label is obtained from an access label adapter 1318, otherwise, the broker it is determined if the broker is authenticated 1320 so the client cannot fooled by a rogue application pretending it's an information broker. If the broker is not authenticated, then the connection is rejected 1304, otherwise the connection is accepted 1310.
In addition to prescribing which event types the client can publish or subscribe to, the client group properties specify whether the events sent between the client and the broker are encrypted for privacy and/or digitally signed for integrity. A subscriber can find out if the event traveled exclusively over secure links, even in a multi broker situation. A broker client can be a member of multiple client groups. For each client group it wants to join concurrently, a client opens a separate channel to the broker. In this way, a client can send or receive the events associated with one client group in encrypted form, and the events associated with another client group in clear form thus incurring the overhead of encryption only for those events whose sensitivity justifies the expense. Figure 14 is an illustration of an enteφrise computer system 1400 having an access label adapter 1402 arranged to provide a subscriber authorization mask in accordance with an embodiment of the invention. The enteφrise computer system 1400 is one embodiment of the enteφrise computer system 900 shown in Figure 9. The authentication server 1402 provides an authorization mask in the form of access labels indicative of the events for which a particular subscriber 904 can access. In operation, the access labels are used by the filter 916 to filter all incoming events determining, thereby, the subscribers 904 which are allowed access to the particular event and contents thereof
Figure 15 is a flowchart detailing an authentication process 1600 carried out in an enteφrise computer system in accordance with an embodiment of the invention. The match filter receives the event and determines the event type 1602. A counter J is initialized to 0 1604 and incremented 1606. It is then determined whether a first subscriber wants the event type 1608. If it is determined that the first subscriber wants the event type, it is then determined if the event instance content matches the first subscriber filter 1610. If it is determined that the instance content matches the first subscriber filter, it is then determined if the first subscriber has permission to receive the event including the received authorization mask 1612. If the first subscriber has permission to receive the event, the event is delivered to the first subscriber 1614. Control then passes to the next subscriber, if any.
Although the foregoing invention has been described in some detail for puφoses of clarity of understanding, it will be apparent that certain changes and modifications may be practiced within the scope of the appended claims. It should be noted that there are many alternative ways of implementing the present invention. It is therefore intended that the following appended claims be inteφreted as including all such alterations, permutations, and equivalents as fall within the spirit and scope of the present invention.

Claims

CLAIMS:
1. A method of transacting an event in an enteφrise computer system, comprising:
(a) establishing a connection with an information broker by a publisher;
(b) determining if the event is registered with the information broker;
(c) accepting a subscription corresponding to a registered event by a subscriber
(d) creating a platform neutral event;
(e) populating the platform neutral event based upon the registered event;
(f) publishing the populated event to the information broker by the publisher; and
(g) receiving the published event by the information broker.
2. A method as recited in claim 1, further comprising:
(h) determining an event type that corresponds to the received event by the
information broker;
(i) determing whether or not the event is a valid event based in part upon the event
type;
(j) determining whether or not the connection is valid; and
(k) queueing the valid event to the subscriber when the connection is valid.
3. A method as recited in claim 2, wherein the determining (i) further comprises:
(1) determining whether or not the event type matches the subscription;
(m) determining whether or not an event security level is verified when the event type
matches the subscription;
(n) determining whether or not an event content matches a content filter when the event
security level is verified and when the event type matches the subscription; and (o) determining whether or not an event authorization is valid when the event security
level is verified and when the event type matches the subscription such that when the event
authorization is valid, the event is the valid event.
4. A method as recited in claim 1 , wherein the enteφrise computer system
includes a plurality of interconnected information brokers.
5. A method as recited in claim 4, wherein the content filter is an updateable
content filter.
6. A method as recited in claim 5, wherein the content filter is updated by a user
as needed.
7. A method as recited in claim 1 , wherein the information broker includes a
preprocessor suitably arranged to perform (h) - (k).
8. A method as recited in claim 7, wherein the information broker further includes
a preprocessor queue that couples the preprocessor to the content filter.
9. A method as recited in claim 8, wherein the enteφrise computer system
includes a plurality of subscribers.
10. A method as recited in claim 9 wherein each of the subscribers has an
associated subscriber queue coupled thereto.
11. An enteφrise computer system, comprising:
a publisher capable of publishing an event;
an information broker validly coupled to the publisher arranged to receive the
published event;
a content filter coupled to the information broker; and
a subscriber arranged to receive a properly subscribed to published event, wherein the
information broker determines whether or not the received event is the properly subscribed to event by determining if an event type corresponding to the published event matches a
subscription associated with the subscriber, and whether or not an event security level
corresponding to the event is verified, and determining whether or not an event content
matches the content filter, and whether or not an event authorization is valid such that when
the published event's type matches the subscription and when the event security level is
verified, and when the event content matches the content filter, and when the event
authorization is valid, then the event is the properly subscribed to event.
12. An enteφrise computer system as recited in claim 11 , wherein the information
broker further includes a preprocessor queue that couples the preprocessor to the content filter.
13. An enteφrise computer system as recited in claim 12, wherein the enteφrise
computer system includes a plurality of subscribers.
14. An enteφrise computer system as recited in claim 13 wherein each of the subscribers has an associated subscriber queue coupled thereto.
15. A method as recited in claim 11, wherein the enteφrise computer system
includes a plurality of interconnected information brokers.
16. A method as recited in claim 11 , wherein the content filter is an updateable
content filter.
17. A method as recited in claim 16, wherein the content filter is updated by a user as needed.
PCT/US1999/030216 1998-12-17 1999-12-16 Enterprise computer system WO2000036542A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU23694/00A AU2369400A (en) 1998-12-17 1999-12-16 Enterprise computer system

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US11263698P 1998-12-17 1998-12-17
US60/112,636 1998-12-17
US09/464,378 1999-12-15
US09/464,378 US7143093B1 (en) 1998-12-17 1999-12-15 Enterprise computer system

Publications (3)

Publication Number Publication Date
WO2000036542A2 true WO2000036542A2 (en) 2000-06-22
WO2000036542A3 WO2000036542A3 (en) 2001-02-08
WO2000036542A9 WO2000036542A9 (en) 2001-09-13

Family

ID=26810180

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1999/030216 WO2000036542A2 (en) 1998-12-17 1999-12-16 Enterprise computer system

Country Status (2)

Country Link
US (2) US7143093B1 (en)
WO (1) WO2000036542A2 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1333643A2 (en) * 2002-02-04 2003-08-06 Sun Microsystems, Inc. Remote services system data delivery mechanism
EP1360561A2 (en) * 2000-12-12 2003-11-12 Bea Systems, Inc. System and method for bounding the life of an event subscription to the availability of an object
EP1405246A2 (en) * 2001-07-05 2004-04-07 Computer Associates Think, Inc. System and method for generating and propagating business events
WO2004066171A1 (en) * 2003-01-22 2004-08-05 International Business Machines Corporation System and method for integrating projects events with personal calendar and scheduling clients
EP1784356A2 (en) * 2004-06-17 2007-05-16 Cisco Technology, Inc. System and method for optimizing inter-domain event services
US7376832B2 (en) 2003-04-21 2008-05-20 International Business Machines Corporation Distributed method, system and computer program product for establishing security in a publish/subscribe data processing broker network

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8181113B2 (en) 1998-12-18 2012-05-15 Microsoft Corporation Mediating conflicts in computer users context data
US7779015B2 (en) 1998-12-18 2010-08-17 Microsoft Corporation Logging and analyzing context attributes
US9183306B2 (en) * 1998-12-18 2015-11-10 Microsoft Technology Licensing, Llc Automated selection of appropriate information based on a computer user's context
US6513046B1 (en) 1999-12-15 2003-01-28 Tangis Corporation Storing and recalling information to augment human memories
US6791580B1 (en) 1998-12-18 2004-09-14 Tangis Corporation Supplying notifications related to supply and consumption of user context data
US7046263B1 (en) 1998-12-18 2006-05-16 Tangis Corporation Requesting computer user's context data
US7225229B1 (en) * 1998-12-18 2007-05-29 Tangis Corporation Automated pushing of computer user's context data to clients
US7464153B1 (en) 2000-04-02 2008-12-09 Microsoft Corporation Generating and supplying user context data
US6990654B2 (en) * 2000-09-14 2006-01-24 Bea Systems, Inc. XML-based graphical user interface application development toolkit
JP4185363B2 (en) * 2001-02-22 2008-11-26 ビーイーエイ システムズ, インコーポレイテッド System and method for message encryption and signing in a transaction processing system
US7359882B2 (en) * 2001-05-11 2008-04-15 Bea Systems, Inc. Distributed run-time licensing
US7185105B2 (en) * 2001-05-11 2007-02-27 Bea Systems, Inc. Application messaging system with flexible message header structure
US20020178035A1 (en) * 2001-05-22 2002-11-28 Lajouanie Yves Patrick Performance management system and method
US20040236621A1 (en) * 2002-02-07 2004-11-25 Eder Jeff Scott Business context layer
US7363363B2 (en) * 2002-05-17 2008-04-22 Xds, Inc. System and method for provisioning universal stateless digital and computing services
US7552445B2 (en) * 2002-12-13 2009-06-23 Savvis Communications Corporation Systems and methods for monitoring events from multiple brokers
US20040260819A1 (en) * 2003-06-23 2004-12-23 Nokia Corporation Systems and methods for restricting event subscriptions through proxy-based filtering
BRPI0509900A (en) * 2004-04-12 2007-09-18 Xds Inc system and method for automatically initiating and dynamically establishing secure internet connections between a protection barrier server and a protection barrier client
US8521570B2 (en) * 2004-12-28 2013-08-27 Sap Aktiengesellschaft Integration of distributed business process models
US8028085B2 (en) * 2005-06-03 2011-09-27 Microsoft Corporation Optimizing message transmission and delivery in a publisher-subscriber model
US7941448B2 (en) 2005-08-26 2011-05-10 At&T Intellectual Property Ii, Lp System and method for event driven publish-subscribe communications
GB0524742D0 (en) * 2005-12-03 2006-01-11 Ibm Methods and apparatus for remote monitoring
US8001080B2 (en) * 2006-09-12 2011-08-16 Infosys Technologies Ltd. Managing real-time execution of transactions in a network
FR2911982A1 (en) * 2007-01-29 2008-08-01 Trustseed Sarl Information processing i.e. evidence and legal value document dematerializing, method for e.g. enterprise, involves triggering emission of message having form, which executes process by computing application implemented with main document
CA2940843C (en) 2008-01-24 2019-07-02 Salesforce.Com, Inc. Method and system for targeted advertising based on topical memes
US9245252B2 (en) 2008-05-07 2016-01-26 Salesforce.Com, Inc. Method and system for determining on-line influence in social media
US20110035594A1 (en) * 2009-07-27 2011-02-10 Barbara Ann Fox Apparatus and method for providing elective message tagging
US8566942B2 (en) * 2009-09-23 2013-10-22 Mcafee, Inc. System, method, and computer program product for tracking the migration of objects to determine whether to perform a network based check
US20110078233A1 (en) * 2009-09-30 2011-03-31 International Business Machines Corporation Apparatus, system, and method for improved performance of real time applications in intermittent connection environments
US8990332B2 (en) * 2009-12-21 2015-03-24 International Business Machines Corporation Performance optimization of a publish operation
EP2659401B1 (en) * 2010-12-30 2019-06-26 Peerapp, Ltd. Methods and systems for caching data communications over computer networks
US8535162B2 (en) 2011-02-18 2013-09-17 Salesforce.Com, Inc. Methods and systems for providing a challenge user interface for an enterprise social network
US8949270B2 (en) 2011-03-10 2015-02-03 Salesforce.Com, Inc. Methods and systems for processing social media data
US8818940B2 (en) * 2011-03-29 2014-08-26 Salesforce.Com, Inc. Systems and methods for performing record actions in a multi-tenant database and application system
US8849770B2 (en) * 2011-05-16 2014-09-30 Business Objects Software Limited Event auditing framework
US8762870B2 (en) 2011-07-19 2014-06-24 Salesforce.Com, Inc. Multifunction drag-and-drop selection tool for selection of data objects in a social network application
US20130046759A1 (en) * 2011-08-15 2013-02-21 Siemens Corporation Connecting questions, answers, announcements and activities to relevant entities
US9591059B2 (en) 2013-03-13 2017-03-07 International Business Machines Corporation File change notifications in a scale-out NAS system
US20170063557A1 (en) * 2015-08-28 2017-03-02 Fortinet, Inc. Detection of fraudulent certificate authority certificates
US10397325B2 (en) * 2015-10-22 2019-08-27 Oracle International Corporation System and method for data payload collection monitoring and analysis in a transaction processing environment
US9501439B1 (en) * 2016-01-19 2016-11-22 International Business Machines Corporation Communicating in an integrated circuit using hardware-managed virtual channels
US20180096412A1 (en) * 2016-09-30 2018-04-05 Mark E. Scott-Nash Digital brokerage service for iot micro compute services
US20180260819A1 (en) * 2017-03-09 2018-09-13 Capital One Services, Llc Systems and methods for real time message processing using an event driven framework
EP3429166B1 (en) * 2017-07-13 2021-09-08 Weeve GmbH Method for operating a communication network

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0806731A2 (en) * 1996-01-18 1997-11-12 Sun Microsystems, Inc. Database network

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6633878B1 (en) * 1999-07-30 2003-10-14 Accenture Llp Initializing an ecommerce database framework
US6640244B1 (en) * 1999-08-31 2003-10-28 Accenture Llp Request batcher in a transaction services patterns environment
US6636855B2 (en) * 2001-03-09 2003-10-21 International Business Machines Corporation Method, system, and program for accessing stored procedures in a message broker

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0806731A2 (en) * 1996-01-18 1997-11-12 Sun Microsystems, Inc. Database network

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "Message Filtering Method" RESEARCH DISCLOSURE,INDUSTRIAL OPPORTUNITIES LTD. HAVANT,GB, vol. 41, no. 414, 1 October 1998 (1998-10-01), XP002141288 ISSN: 0374-4353 *
BILL SEGALL AND DAVID ARNOLD: "Elvin has left the building: A publish/subscribe notification service with quenching" PROCEEDINGS OF AUUG97, [Online] - September 1997 (1997-09) XP002152244 Brisbane, Australia Retrieved from the Internet: <URL:http://elvin.dstc.edu.au/doc/papers/a uug97/AUUG97.html> [retrieved on 2000-11-03] *
CUGOLA G ET AL: "Exploiting an event-based infrastructure to develop complex distributed systems" PROCEEDINGS OF THE 1998 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING. FORGING NEW LINKS (CAT. NO.98CB36139), PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, KYOTO, JAPAN, 19-25 APRIL 1998, pages 261-270, XP002152243 1998, Los Alamitos, CA, USA, IEEE Comput. Soc, USA ISBN: 0-8186-8368-6 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1360561A2 (en) * 2000-12-12 2003-11-12 Bea Systems, Inc. System and method for bounding the life of an event subscription to the availability of an object
EP1360561A4 (en) * 2000-12-12 2008-01-23 Bea Systems Inc System and method for bounding the life of an event subscription to the availability of an object
EP1405246A2 (en) * 2001-07-05 2004-04-07 Computer Associates Think, Inc. System and method for generating and propagating business events
EP1405246A4 (en) * 2001-07-05 2005-09-21 Computer Ass Think Inc System and method for generating and propagating business events
EP1333643A2 (en) * 2002-02-04 2003-08-06 Sun Microsystems, Inc. Remote services system data delivery mechanism
EP1333643A3 (en) * 2002-02-04 2004-05-19 Sun Microsystems, Inc. Remote services system data delivery mechanism
WO2004066171A1 (en) * 2003-01-22 2004-08-05 International Business Machines Corporation System and method for integrating projects events with personal calendar and scheduling clients
US7376832B2 (en) 2003-04-21 2008-05-20 International Business Machines Corporation Distributed method, system and computer program product for establishing security in a publish/subscribe data processing broker network
US7996668B2 (en) 2003-04-21 2011-08-09 International Business Machines Corporation Distributed system and computer program product for establishing security in a publish/subscribe data processing broker network
EP1784356A2 (en) * 2004-06-17 2007-05-16 Cisco Technology, Inc. System and method for optimizing inter-domain event services
EP1784356A4 (en) * 2004-06-17 2009-11-18 Cisco Tech Inc System and method for optimizing inter-domain event services

Also Published As

Publication number Publication date
WO2000036542A9 (en) 2001-09-13
WO2000036542A3 (en) 2001-02-08
US7447673B2 (en) 2008-11-04
US20060200444A1 (en) 2006-09-07
US7143093B1 (en) 2006-11-28

Similar Documents

Publication Publication Date Title
US7143093B1 (en) Enterprise computer system
JP7454616B2 (en) DAG-based transaction processing method and system in distributed ledger
US7774485B2 (en) Dynamic service composition and orchestration
US9794298B2 (en) Method, system, and computer program product for facilitating communication in an interoperability network
US5544322A (en) System and method for policy-based inter-realm authentication within a distributed processing system
US9037726B2 (en) Apparatus and methods for managing messages sent between services
US20200007458A1 (en) System and method for managing distributed objects as a single representation
Harrison et al. Mobile Agents: Are they a good idea?
KR100600959B1 (en) Provisioning aggregated services in a distributed computing environment
US7748027B2 (en) System and method for dynamic data redaction
US9588828B2 (en) System and method for routing messages between applications
JP2021533448A (en) Systems and methods to support SQL-based rich queries in hyperlegger fabric blockchain
US7640348B2 (en) System and method of managing access to web services
US20080148342A1 (en) Management of application specific data traffic
US20020103811A1 (en) Method and apparatus for locating and exchanging clinical information
US20060106748A1 (en) System and method for orchestrating composite web services in constrained data flow environments
US20060259977A1 (en) System and method for data redaction client
JPH11250146A (en) Financial transaction processing system
US20060259614A1 (en) System and method for distributed data redaction
US20070192431A1 (en) Method and apparatus for service oriented architecture infrastructure switch
CN112541828B (en) System, method, device, processor and storage medium for realizing open securities management and open securities API access control
US9137227B2 (en) Matching entitlement information for multiple sources
US11736470B2 (en) Systems and methods for blockchain validation and data record access employing a blockchain configured banking core and blockchain configured federation proxies
Karp et al. The client utility architecture: the precursor to E-speak
Graupner et al. E-Speak—An XML Document Interchange Engine

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: A3

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

AK Designated states

Kind code of ref document: C2

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: C2

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

COP Corrected version of pamphlet

Free format text: PAGES 1/16-16/16, DRAWINGS, REPLACED BY NEW PAGES 1/16-16/16; DUE TO LATE TRANSMITTAL BY THE RECEIVING OFFICE

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase